Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
5599836d66d6fc8f4728ae17efbe5a52.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5599836d66d6fc8f4728ae17efbe5a52.exe
Resource
win10v2004-20231222-en
General
-
Target
5599836d66d6fc8f4728ae17efbe5a52.exe
-
Size
82KB
-
MD5
5599836d66d6fc8f4728ae17efbe5a52
-
SHA1
49a741fb0e7c2f3cfc886c73b0c69d58f9bd3ac0
-
SHA256
cef42f097dfa230b7da4cfcc8da86035ee5d44f365150d0fe5f6b206264cc1cf
-
SHA512
1a0589930163816af40059e5197a34ee564d7c4bd1d838ad564ab988be6c5cad5f4b2b2518b0675be3b15ffe9655c2057d31a0f6262b54e740b4904b30cd36a5
-
SSDEEP
1536:yBkvVKvgbVmWElpbGwsuqjmWlsawJnmNsTNcUa+ve6KcdtxjKH7:t448ni+PWlsawouJvefR7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1748 5599836d66d6fc8f4728ae17efbe5a52.exe -
Executes dropped EXE 1 IoCs
pid Process 1748 5599836d66d6fc8f4728ae17efbe5a52.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1232 5599836d66d6fc8f4728ae17efbe5a52.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1232 5599836d66d6fc8f4728ae17efbe5a52.exe 1748 5599836d66d6fc8f4728ae17efbe5a52.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1748 1232 5599836d66d6fc8f4728ae17efbe5a52.exe 16 PID 1232 wrote to memory of 1748 1232 5599836d66d6fc8f4728ae17efbe5a52.exe 16 PID 1232 wrote to memory of 1748 1232 5599836d66d6fc8f4728ae17efbe5a52.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\5599836d66d6fc8f4728ae17efbe5a52.exeC:\Users\Admin\AppData\Local\Temp\5599836d66d6fc8f4728ae17efbe5a52.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1748
-
C:\Users\Admin\AppData\Local\Temp\5599836d66d6fc8f4728ae17efbe5a52.exe"C:\Users\Admin\AppData\Local\Temp\5599836d66d6fc8f4728ae17efbe5a52.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1232
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD56f6901fbdff15378e4675617327370dd
SHA10afd80b9ef24479ba3a4ddf0827b2d2fa3e6ef73
SHA256ef66b8cce64013851165e09b908811843436bec0ffbb7b0d8e074f435cb2bd40
SHA5128a3957e6f8226bf6da66329f07f4c2a1bffa74785b1c34faf61d8fe7860c3fe1fef5adc63febce3b8b0b6cc1ada093d1efc6762d443af0f5fe59df7e21ceb427